7.3 End-to-End Encryption
Our end-to-end encryption design eliminates Zoom servers’ role in generating (and controlling access to) the meeting key, shifting this responsibility to the participants’ Zoom clients. No secret key material or unencrypted meeting contents will be provided to Zoom infrastructure servers, except in specific cases where this sharing is explicitly authorized by meeting participants (e.g., to support abuse reporting). In end-to-end encrypted meetings: • “Join Before Host” and Cloud Recording cannot be enabled. • All participating clients must run the official Zoom client software; it is not possible to join using dial-ins, web browsers, or legacy Zoom-enabled devices. • Participants can see a “meeting leader security code” that they can use to verify that no one’s connection to the meeting is being tampered with. The host can read this code out loud, and all participants can check that their clients display the same code.
Last updated